Abstract:
The first part of this talk focuses on physical-layer security schemes that are used to enforce confidentiality and access control on the wireless channel.
We review the main assumptions made by these schemes and discuss attacks which illustrate their limitations.
The second part of the talk focuses on secure localization and proximity verification schemes.
Here we review the main design challenges in this area and show some recent results related to the GPS spoofing detection using COTS receivers.

Abstract:
As security specialists, we all know that security is never perfect.
It is a compromise of many conflicting requirements and every system can be broken - it is a question of time, money, and expertise, but equally well a question of what incentives are there to attack a system.
In this presentation I want to high-light how the industry - and here in particular the smart card industry - assesses the security levels of products, what challenges we face and what kind of solutions we need to seek, as systems are becoming more and more complex in an ever increasingly connected world.

Abstract:
Over the past decade (hardware) piracy has evolved significantly.
The techniques used by pirates are largely determined by the accessibility of failure analysis equipment.
As a result, hardware attacks have become more and more invasive.
Techniques such as electrical glitching, which had been successful in the past, have been replaced by semi-invasive laser glitching.
However, fully-invasive techniques such as linear code extraction remain foolproof to this day.
The threat posed by piracy continues to expand and now includes IP violation, counterfeits and even hardware backdoors.
For this reason the security of modern devices needs to be reassessed in light of these emerging threats.